GRIDLOCK. Personnel. Duration: 3 years, starting in August 2002

Size: px
Start display at page:

Download "GRIDLOCK. Personnel. Duration: 3 years, starting in August 2002"

Transcription

1 GRIDLOCK Personnel Joan Feigenbaum, Yale Angelos D. Keromytis, Columbia Jonathan M. Smith, Penn PhD students: Zhong, Ioannidis, Cook Duration: 3 years, starting in August 2002 Research Goals: Security management in large multi-application environments Unified approach to network and host security Virtual Private Services

2 General Problem Network and host security are now handled separately Incompatible configurations of components Leads to lack of end-to-end coherence Security vulnerabilities Loss of functionality VPN Configuration Packet filtering Firewall Apache Policy CGI CGI Local FS File ACLs Host based Network ACLs File Server Remote FS File ACLs Web Server Outside Inside View based ACLs Credit Card DB

3 GRIDLOCK Hypothesis Unification of network and host access-control mechanisms Technical components: Globally specified, locally interpreted policies Domain-specific policy meta-languages Virtual Private Services: Extend OS notions of virtual machine and process isolation to distributed systems Host 1 Policy Policy File System Data Base Policy Other Policy Network Policy... Host N Policy File System Policy Policy Other Network Host1 File Server FS View1 FS View2 Web Server CGI1 CGI2 Network Layer Network Layer Network Layer Host2 File Server FS View1 FS View2 Host3 Data Base DB View1 DB View2

4 Virtual Private Services Examples, in increasing order of complexity: Distributed database Virtual network infrastructure Virtual organization To achieve vision, we need: Efficient policy-enforcement mechanisms for the different components High-level, domain-specific policy languages Tools for verifying correctness and consistency Automated administration Starting point: trust management KeyNote trust-management system Distributed policy expressed explicitly and via credentials

5 Challenges Devising good application-domain (AD) languages Expressive, usable, efficiently implementable Cover multiple applications within a domain Managing diverse security mechanisms Example: filesystem vs. firewall semantics Conflict resolution and non-monotonicity Scalability Automating administration Performance

6 Current Activities Develop tools PEPL: framework for creating AD-specific languages DisCFS: credential-based network filesystem WebDAVA: user-managed, web-based file storage Translate AD-specific policies to KeyNote Use conflict-resolution capabilities of trust-management engines Augment existing access-control points with KeyNote Lightweight decision making Leverage localization of access control for scalability Enhance KeyNote as needed

7 Planned Experimentation Deploy shared filesystem across the three institutions Combine file-access control, firewall configuration, and web-server ACLs Use environment for joint authoring of reports and papers Implement full-fledged distributed database Extend to storage marketplace Integrate payment mechanism Virtual organization Combine network services and distributed-database services Integrate VPN and QoS capabilities

8 First-Year Accomplishments Sample of publications from first year - "EasyVPN: IPsec Remote Access Made Easy," USENIX LISA, October "Secure and Flexible Global File Sharing," USENIX Freenix, June "Experience with the KeyNote Trust Management System: Applications and Future Directions," 1st International Conference on Trust Management, May "Design and Implementation of Virtual Private Services," IEEE WETICE, June "WebDAVA: An Administrator-Free Approach to Web File-Sharing," IEEE WETICE, June "Sprite: A Simple, Cheat-proof, Credit-based System for Mobile Ad-Hoc Networks," IEEE Infocom, April "Verifiable Distributed Oblivious Transfer and Mobile Agent Security," DIALM/POMC, September 2003 DisCFS prototype ( PEPL compiler ( WebDAVA prototype (

WebDAVA: An Administrator-Free Approach To Web File-Sharing

WebDAVA: An Administrator-Free Approach To Web File-Sharing WebDAVA: An Administrator-Free Approach To Web File-Sharing Alexander Levine Alexander.Levine@drexel.edu Drexel University Vassilis Prevelakis vp@drexel.edu Drexel University John Ioannidis Sotiris Ioannidis

More information

Managing Access Control in Large Scale Heterogeneous Networks

Managing Access Control in Large Scale Heterogeneous Networks Managing Access Control in Large Scale Heterogeneous Networks Angelos D. Keromytis, Kostas Anagnostakis, Sotiris Ioannidis, Michael B. Greenwald and Jonathan M. Smith Abstract The design principle of maximizing

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008 (MS6416)

Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008 (MS6416) Duration: 5 days About this Course This five-day instructor-led course provides students with the knowledge and skills to work with Network Infrastructure and Active Directory technologies in Windows Server

More information

Implementing a Distributed Firewall

Implementing a Distributed Firewall Implementing a Distributed Firewall Sotiris Ioannidis Angelos D. Keromytis Steve M. Bellovin Jonathan M. Smith Presented By Jim Michaud 1 Outline Intro to Security and Firewalls Problems with Current Firewalls

More information

Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008

Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008 Updating your Network Infrastructure and Active Directory Technology Skills to Windows Introduction This five day instructor led course provides students with the knowledge and skills to work with Network

More information

Design and Implementation of Virtual Private Services

Design and Implementation of Virtual Private Services Design and Implementation of Virtual Private Services Sotiris Ioannidis Steven M. Bellovin John Ioannidis sotiris@dsl.cis.upenn.edu smb@research.att.com ji@research.att.com University of Pennsylvania AT&T

More information

Trust Management and Network Layer Security Protocols Matt Blaze 1 and John Ioannidis 1 and Angelos D. Keromytis 2 1 AT&T Laboratories { Research fmab,jig@research.att.com 2 Distributed Systems Labs CIS

More information

Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008

Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008 Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008 Overview About this Course This five-day instructor-led course provides students with the knowledge and

More information

Firewalls and IDS. Sumitha Bhandarkar James Esslinger

Firewalls and IDS. Sumitha Bhandarkar James Esslinger Firewalls and IDS Sumitha Bhandarkar James Esslinger Outline Background What are firewalls and IDS? How are they different from each other? Firewalls Problems associated with conventional Firewalls Distributed

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

MOC 6435A Designing a Windows Server 2008 Network Infrastructure MOC 6435A Designing a Windows Server 2008 Network Infrastructure Course Number: 6435A Course Length: 5 Days Certification Exam This course will help you prepare for the following Microsoft exam: Exam 70647:

More information

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,

More information

VNLINFOTECH JOIN US & MAKE YOUR FUTURE BRIGHT. mcsa (70-413) Microsoft certified system administrator. (designing & implementing server infrasturcure)

VNLINFOTECH JOIN US & MAKE YOUR FUTURE BRIGHT. mcsa (70-413) Microsoft certified system administrator. (designing & implementing server infrasturcure) VNLINFOTECH JOIN US & MAKE YOUR FUTURE BRIGHT mcsa (70-413) Microsoft certified system administrator (designing & implementing server infrasturcure) www.vnlinfotech.com MODULE 1 : Considerations for Upgrades

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure Course 20413C: Designing and Implementing a Server Infrastructure Course Details Course Outline Module 1: Planning Server Upgrade and Migration This module explains how to plan a server upgrade and migration

More information

Microsoft SharePoint 2007: for End Users and Site Owner

Microsoft SharePoint 2007: for End Users and Site Owner coursemonster.com/au Microsoft SharePoint 2007: for End Users and Site Owner View training dates» Overview This two day instructor led course is designed for the Site Owner / "power user" of a SharePoint

More information

Updating Your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008

Updating Your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008 MOC6416 Updating Your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008 About this Course This five-day instructor-led course provides students with the knowledge and

More information

Hypothesis Testing for Network Security

Hypothesis Testing for Network Security Hypothesis Testing for Network Security Philip Godfrey, Matthew Caesar, David Nicol, William H. Sanders, Dong Jin INFORMATION TRUST INSTITUTE University of Illinois at Urbana-Champaign We need a science

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure Page 1 of 7 Overview This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and deploy a physical and logical Windows Server 2012 Active Directory Domain Services

More information

Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Course No.

Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Course No. COURSE OVERVIEW This five-day instructor-led course provides students with the knowledge and skills to implement and manage a Microsoft Windows Server 2003 network The course is intended for systems administrator

More information

COURSE OUTLINE MOC 20413: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE

COURSE OUTLINE MOC 20413: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE COURSE OUTLINE MOC 20413: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE MODULE 1: PLANNING SERVER UPGRADE AND MIGRATION This module explains how to plan a server upgrade and migration strategy. Considerations

More information

Monitoring Remote Access VPN Services

Monitoring Remote Access VPN Services CHAPTER 5 A remote access service (RAS) VPN secures connections for remote users, such as mobile users or telecommuters. RAS VPN monitoring provides all of the most important indicators of cluster, concentrator,

More information

Planning for Windows Server 2008 Servers

Planning for Windows Server 2008 Servers Planning for Windows Server 2008 Servers Course Number: 6430B Course Length: 3 Days Course Overview This 3-day course is intended for IT pros who are interested in the knowledge and skills necessary to

More information

Network Services Internet VPN

Network Services Internet VPN Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order

More information

Course Syllabus. 6416: Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008. Key Data.

Course Syllabus. 6416: Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008. Key Data. Course Syllabus 6416: Updating your Network Infrastructure and Active Key Data Product #: 3702 Course #: 6416B Number of Days: 5 Format: Instructor-Led Certification Exams: This course helps you prepare

More information

SolarWinds Certified Professional. Exam Preparation Guide

SolarWinds Certified Professional. Exam Preparation Guide SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how

More information

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview

More information

Course # 20417B. Upgrading Your Skills to MCSA Windows Server 2012

Course # 20417B. Upgrading Your Skills to MCSA Windows Server 2012 Course # 20417B Upgrading Your Skills to MCSA Windows Server 2012 Duration: 40 Hrs About this Course This version of this course is built on the final release version of Windows Server 2012 This 5-day

More information

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline

More information

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Fundamentals of Windows Server 2008 Network and Applications Infrastructure Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure

More information

Secret Server Qualys Integration Guide

Secret Server Qualys Integration Guide Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server

More information

Networking with Windows Server vb. Day(s): 5. Version: Overview

Networking with Windows Server vb. Day(s): 5. Version: Overview Networking with Windows Server vb Day(s): 5 Course Code: M10970 Version: B Overview Get hands-on instruction and practice implementing networking with Windows Server 2012 and Windows Server 2012 R2 in

More information

In this training module, you learn how to configure and deploy a machine with a monitoring agent through Tivoli Service Automation Manager V7.2.2.

In this training module, you learn how to configure and deploy a machine with a monitoring agent through Tivoli Service Automation Manager V7.2.2. In this training module, you learn how to configure and deploy a machine with a monitoring agent through Tivoli Service Automation Manager V7.2.2. deploy_machine_with_itm_agent.ppt Page 1 of 17 This training

More information

Cloud Security Best Practices

Cloud Security Best Practices Cloud Security Best Practices Cohesive Networks - your applications secured VNS3 security and connectivity solutions protect cloud-based applications from exploitation by hackers, criminal gangs, and foreign

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure Course Code: M20413 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Designing and Implementing a Server Infrastructure Overview Get hands-on instruction and practice planning, designing and deploying

More information

Upgrading Your Skills to MCSA Windows Server 2012 Course 20417A: 5 Days; Instructor-Led

Upgrading Your Skills to MCSA Windows Server 2012 Course 20417A: 5 Days; Instructor-Led Upgrading Your Skills to MCSA Windows Server 2012 Course 20417A: 5 Days; Instructor-Led About this Course This version of this course, 20417A, utilizes pre-release software in the virtual machines for

More information

20413C: Designing and Implementing a Server Infrastructure

20413C: Designing and Implementing a Server Infrastructure 20413C: Designing and Implementing a Server Course Details Course Code: Duration: Notes: 20413C 5 days This course syllabus should be used to determine whether the course is appropriate for the students,

More information

Introduction to Endpoint Security

Introduction to Endpoint Security Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user

More information

How To Use The Dcml Framework

How To Use The Dcml Framework DCML Framework Use Cases Introduction Use Case 1: Monitoring Newly Provisioned Servers Use Case 2: Ensuring Accurate Asset Inventory Across Multiple Management Systems Use Case 3: Providing Standard Application

More information

20417-Upgrading Your Skills to MCSA Windows Server 2012

20417-Upgrading Your Skills to MCSA Windows Server 2012 Course Outline 20417-Upgrading Your Skills to MCSA Windows Server 2012 Duration: 5 day (30 hours) Target Audience: This course is intended for Information Technology (IT) Professionals who are already

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

Augmented Search for IT Data Analytics. New frontier in big log data analysis and application intelligence

Augmented Search for IT Data Analytics. New frontier in big log data analysis and application intelligence Augmented Search for IT Data Analytics New frontier in big log data analysis and application intelligence Business white paper May 2015 IT data is a general name to log data, IT metrics, application data,

More information

Augmented Search for Software Testing

Augmented Search for Software Testing Augmented Search for Software Testing For Testers, Developers, and QA Managers New frontier in big log data analysis and application intelligence Business white paper May 2015 During software testing cycles,

More information

Best practices on cellular M2M deployment. Paul Bunnell November 2014

Best practices on cellular M2M deployment. Paul Bunnell November 2014 Best practices on cellular M2M deployment Paul Bunnell November 2014 Overview Installation Security Product Trends Wrap up 2 Installation Considerations for installing cellular automation equipment: Cellular

More information

Security Considerations for DirectAccess Deployments. Whitepaper

Security Considerations for DirectAccess Deployments. Whitepaper Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift

More information

Firewalls P+S Linux Router & Firewall 2013

Firewalls P+S Linux Router & Firewall 2013 Firewalls P+S Linux Router & Firewall 2013 Firewall Techniques What is a firewall? A firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network

More information

Apple Pro Training Series. OS X Server. Essentials. Arek Dreyer. and Ben Greisler

Apple Pro Training Series. OS X Server. Essentials. Arek Dreyer. and Ben Greisler Apple Pro Training Series OS X Server Essentials Arek Dreyer and Ben Greisler Table of Contents Configuring and Monitoring OS X Server Lesson 1 About This Guide 3 Learning Methodology 4 Lesson Structure

More information

Designing and Deploying Cloud Solutions for Small and Medium Business

Designing and Deploying Cloud Solutions for Small and Medium Business Designing and Deploying Cloud Solutions for Small and Medium Business HPATA Cloud Study Guide Rev 1.1 Table of Contents 1.1 Describe and recognize common virtualization technologies and products and their

More information

Cisco Certified Security Professional (CCSP)

Cisco Certified Security Professional (CCSP) 529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination

More information

Private Cloud Solutions Virtual Onsite Data Center

Private Cloud Solutions Virtual Onsite Data Center ZEROOUTAGES WHITE PAPER Private Cloud Solutions Virtual Onsite Data Center ZEROOUTAGES - WHITE PAPER Single Side / Balancing The ZeroOutages solution makes for a perfect link bonding/balancing device for

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure WINDOWS 2012 COURSE OUTLINE Visit Our Website to Enroll Now Www.ITBigBang.Com/IT-Training Designing and Implementing a Server Infrastructure Course Title Designing and Implementing a Server Infrastructure

More information

Build Your Knowledge!

Build Your Knowledge! About this Course This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and deploy a physical and logical Windows Server 2012 Active Directory Domain Services

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure Course Duration: 5 days Overview: Get hands-on instruction and practice planning, designing and deploying a physical and logical Windows Server 2012 R2 enterprise infrastructure in this 5-day Microsoft

More information

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks. Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted

More information

Privacy and Identity Management for Europe

Privacy and Identity Management for Europe Privacy and Identity Management for Europe Pierangela Samarati Università degli Studi di Milano Milan, Italy samarati@dti.unimi.it Page 1 Vision and Objectives Users disclose vast amounts of personal information

More information

This How To guide will take you through configuring Network Load Balancing and deploying MOSS 2007 in SharePoint Farm.

This How To guide will take you through configuring Network Load Balancing and deploying MOSS 2007 in SharePoint Farm. Quick Brief This How To guide will take you through configuring Network Load Balancing and deploying MOSS 2007 in SharePoint Farm. This document will serve as prerequisite for Enterprise Portal deployment

More information

REMOTE ASSISTANCE SOLUTIONS Private Server

REMOTE ASSISTANCE SOLUTIONS Private Server REMOTE ASSISTANCE SOLUTIONS Private Server UBIQUITY components Control Center: client on the remote assistance PC Ubiquity Runtime: software installed on the remote device Ubiquity Server Infrastructure:

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Delivering Managed Services Using Next Generation Branch Architectures

Delivering Managed Services Using Next Generation Branch Architectures Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN

More information

How To Manage A Virtualization Server

How To Manage A Virtualization Server Brain of the Virtualized Data Center Contents 1 Challenges of Server Virtualization... 3 1.1 The virtual network breaks traditional network boundaries... 3 1.2 The live migration function of VMs requires

More information

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges

More information

Configuring Windows Server 2008 Network Infrastructure

Configuring Windows Server 2008 Network Infrastructure Configuring Windows Server 2008 Network Infrastructure Course Number: 70-642 Certification Exam This course is preparation for the Microsoft Technical Specialist (TS) exam, Exam 70-642: TS: Windows Server

More information

VMware vcloud Air Security TECHNICAL WHITE PAPER

VMware vcloud Air Security TECHNICAL WHITE PAPER TECHNICAL WHITE PAPER The Shared Security Model for vcloud Air The end-to-end security of VMware vcloud Air (the Service ) is shared between VMware and the customer. VMware provides security for the aspects

More information

Course 20417B: Upgrading Your Skills to MCSA Windows Server 2012

Course 20417B: Upgrading Your Skills to MCSA Windows Server 2012 Course 20417B: Upgrading Your Skills to MCSA Windows Server 2012 About this Course This version of this course is built on the final release version of Windows Server 2012 This 5-day instructor-led course

More information

Course Outline: Course 20413-Designing and Implementing a Server Infrastructure

Course Outline: Course 20413-Designing and Implementing a Server Infrastructure Course Outline: Course 20413-Designing and Implementing a Server Infrastructure Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: This 5-day instructor-led course

More information

VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink rvandenbrink@metafore.ca

VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink rvandenbrink@metafore.ca VPNSCAN: Extending the Audit and Compliance Perimeter Rob VandenBrink rvandenbrink@metafore.ca Business Issue Most clients have a remote access or other governing policy that has one or more common restrictions

More information

LOGIIC Remote Access. Final Public Report. June 2015 1 LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

LOGIIC Remote Access. Final Public Report. June 2015 1 LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION LOGIIC Remote Access June 2015 Final Public Report Document Title LOGIIC Remote Monitoring Project Public Report Version Version 1.0 Primary Author A. McIntyre (SRI) Distribution Category LOGIIC Approved

More information

Proposal to Migrate from a Workgroup to a Domain

Proposal to Migrate from a Workgroup to a Domain Proposal to Migrate from a Workgroup to a Domain Kenneth Ketola K M S T o o l s & E q u i p m e n t L t d. 1 1 0 W o o l r i d g e S t r e e t C o q u i t l a m, B r i t i s h C o l u m b i a V 3 K 5 V

More information

"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary

Charting the Course... ... to Your Success! MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test

More information

DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS. Single Computer running I m InTouch with a DSL or Cable Modem Internet Connection

DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS. Single Computer running I m InTouch with a DSL or Cable Modem Internet Connection DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS Introduction I m InTouch is a personal remote access application that allows a user to access the data on his or her PC from a remote location,

More information

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.

More information

CISCO IOS NETWORK SECURITY (IINS)

CISCO IOS NETWORK SECURITY (IINS) CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.

More information

How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud)

How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud) SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,

More information

Link Layer and Network Layer Security for Wireless Networks

Link Layer and Network Layer Security for Wireless Networks Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services (5 days)

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services (5 days) Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services (5 days) Course 2277: Five days; Instructor-led Introduction This five-day, instructor-led

More information

Where can I install GFI EventsManager on my network?

Where can I install GFI EventsManager on my network? Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location

More information

Emulating an Embedded Firewall

Emulating an Embedded Firewall Emulating an Embedded Firewall Clifford Neuman, Deepak Dayama, and Arun Viswanathan University of Southern California Abstract The Adventium Labs Embedded Distributed Firewall provides a simple interface

More information

COURSE 20413C: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE

COURSE 20413C: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE ABOUT THIS COURSE This 5 day course covers the knowledge and skills needed to provide an enterprise solution that supports manual and automated server installations in a physical and virtual environment

More information

What are your firm s plans to adopt x86 server virtualization? Not interested

What are your firm s plans to adopt x86 server virtualization? Not interested The benefits of server virtualization are widely accepted and the majority of organizations have deployed virtualization technologies. Organizations are virtualizing mission-critical workloads but must

More information

70-685: Enterprise Desktop Support Technician

70-685: Enterprise Desktop Support Technician 70-685: Enterprise Desktop Support Technician Course Introduction Course Introduction Chapter 01 - Identifying Cause and Resolving Desktop Application Issues Identifying Cause and Resolving Desktop Application

More information

15 th April 2010 FIA Valencia

15 th April 2010 FIA Valencia Autonomic Internet (AutoI) FP7 STREP Project Management of Virtual Infrastructure http://ist-autoi.eu/ 15 th April 2010 FIA Valencia Alex Galis University College London a.galis@ee.ucl.ac.uk www.ee.ucl.ac.uk/~agalis

More information

Microsoft Windows Server System White Paper

Microsoft Windows Server System White Paper Introduction to Network Access Protection Microsoft Corporation Published: June 2004, Updated: May 2006 Abstract Network Access Protection, a platform for Microsoft Windows Server "Longhorn" (now in beta

More information

Implementing Reverse Proxy Using Squid. Prepared By Visolve Squid Team

Implementing Reverse Proxy Using Squid. Prepared By Visolve Squid Team Implementing Reverse Proxy Using Squid Prepared By Visolve Squid Team Introduction What is Reverse Proxy Cache About Squid How Reverse Proxy Cache work Configuring Squid as Reverse Proxy Configuring Squid

More information

Alcatel-Lucent Services

Alcatel-Lucent Services SOLUTION DESCRIPTION Alcatel-Lucent Services Security Introduction Security is a sophisticated business and technical challenge, and it plays an important role in the success of any network, service or

More information

ICAWEB423A Ensure dynamic website security

ICAWEB423A Ensure dynamic website security ICAWEB423A Ensure dynamic website security Release: 1 ICAWEB423A Ensure dynamic website security Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications

More information

Cisco ASA 5500-X Series ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, and ASA 5555-X

Cisco ASA 5500-X Series ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, and ASA 5555-X QUICK START GUIDE Cisco ASA 5500-X Series ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, and ASA 5555-X 1 Package Contents 1 Powering On the ASA 2 Connecting Interface Cables and Verifying Connectivity

More information

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network Configuring an IPsec VPN to provide ios devices with secure, remote access to the network This recipe uses the IPsec VPN Wizard to provide a group of remote ios users with secure, encrypted access to the

More information

ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector

ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 financial_nccoe@nist.gov This revision incorporates comments from the public. Page Use case 1 Comments

More information

AN INTEGRATED SECURITY ARCHITECTURE FOR ENTERPRISE NETWORKS. BY OWOH, Nsikak Pius (B.Sc. Computer Science & M.Tech Cyber Security Science)

AN INTEGRATED SECURITY ARCHITECTURE FOR ENTERPRISE NETWORKS. BY OWOH, Nsikak Pius (B.Sc. Computer Science & M.Tech Cyber Security Science) [ AN INTEGRATED SECURITY ARCHITECTURE FOR ENTERPRISE NETWORKS. BY OWOH, Nsikak Pius (B.Sc. Computer Science & M.Tech Cyber Security Science) Ph.D. PROPOSAL SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE

More information

Content-Centric Networking Applications For Medical Devices and Healthcare Management Systems

Content-Centric Networking Applications For Medical Devices and Healthcare Management Systems Content-Centric Networking Applications For Medical Devices and Healthcare Management Systems DISCUSSION DOCUMENT JULY 2012. PARC, 3333 Coyote Hill Road, Palo Alto, California 94304 USA +1 650 812 4000

More information

DIRECTACCESS FEATURE IN WINDOWS 7

DIRECTACCESS FEATURE IN WINDOWS 7 DIRECTACCESS FEATURE IN WINDOWS 7 What is DirectAccess DirectAccess is an always on connection to our remote private network, regardless of where we are. Starting from Windows 7 and Windows Server 2008

More information

With a little bit of IPv6 magic: Windows 7 DirectAccess

With a little bit of IPv6 magic: Windows 7 DirectAccess With a little bit of IPv6 magic: Windows 7 DirectAccess Click to edit Master subtitle style Thomas Treml Technologieberater Microsoft Deutschland GmbH Thomas.Treml@microsoft.com Networking and Access Landscape

More information

Designing and Implementing a Server Infrastructure 20413C; 5 days, Instructor-led

Designing and Implementing a Server Infrastructure 20413C; 5 days, Instructor-led Designing and Implementing a Server Infrastructure 20413C; 5 days, Instructor-led Course Description Get hands-on instruction and practice planning, designing and deploying a physical and logical Windows

More information

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

INTRODUCTION TO FIREWALL SECURITY

INTRODUCTION TO FIREWALL SECURITY INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ

More information

NetScreen s Approach to Scalable Policy-based Management

NetScreen s Approach to Scalable Policy-based Management NetScreen s Approach to Scalable Policy-based Management March 2002 A White Paper By NetScreen Technologies Inc. http://www.netscreen.com Table of Contents Introduction... 3 Traditional Management vs.

More information

BM482E Introduction to Computer Security

BM482E Introduction to Computer Security BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based

More information

Course 20413: Designing and Implementing a Server Infrastructure

Course 20413: Designing and Implementing a Server Infrastructure Course 20413: Designing and Implementing a Server Infrastructure Overview About this course Get hands-on instruction and practice planning, designing and deploying a physical and logical Windows Server

More information

Windows 7, Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician Windows 7, Enterprise Desktop Support Technician Course Number: 70-685 Certification Exam This course is preparation for the Microsoft Certified IT Professional (MCITP) Exam, Exam 70-685: Pro: Windows

More information